EP2136583A2 - Verfahren und Vorrichtung zur Analyse von Kommunikationssystem-Sende-Empfangsgeräten - Google Patents

Verfahren und Vorrichtung zur Analyse von Kommunikationssystem-Sende-Empfangsgeräten Download PDF

Info

Publication number
EP2136583A2
EP2136583A2 EP09007946A EP09007946A EP2136583A2 EP 2136583 A2 EP2136583 A2 EP 2136583A2 EP 09007946 A EP09007946 A EP 09007946A EP 09007946 A EP09007946 A EP 09007946A EP 2136583 A2 EP2136583 A2 EP 2136583A2
Authority
EP
European Patent Office
Prior art keywords
message
parameter
base station
analyzer
same base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP09007946A
Other languages
English (en)
French (fr)
Other versions
EP2136583A3 (de
Inventor
Padraig Stapleton
Hing On Ngai
Benjamin Ip
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TNC US Holdings Inc
Original Assignee
TNC US Holdings Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TNC US Holdings Inc filed Critical TNC US Holdings Inc
Publication of EP2136583A2 publication Critical patent/EP2136583A2/de
Publication of EP2136583A3 publication Critical patent/EP2136583A3/de
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Definitions

  • the present disclosure pertains to analyzing communication systems and, more particularly, to methods and apparatus to analyze communication system transceivers.
  • Mobile communication service providers establish base communication stations across their coverage areas to allow users of the communication services to communicate with the communication service throughout the coverage area. As users move throughout the coverage area, a communication session between a mobile device and the communication system is handled by one or more of the base stations. The placement of such base communication stations is typically not disclosed by the mobile communication service providers and is often intentionally kept as a secret.
  • Communications e.g., messages transmitted by base stations do not always uniquely identify the base station.
  • communications according to the code division multiple access (CDMA) communication standard include a pseudo random (PN) number associated with the base station
  • PN pseudo random
  • each base station can include multiple PN numbers (e.g., here the base station includes multiple communication sectors (e.g., antennas)) and the PN numbers may not be unique throughout the communication system (e.g., two base stations may use the same PN number).
  • FIG. 1 is a block diagram of an example system in which a monitoring system is used to analyze communication system transceivers.
  • FIG. 2 is a block diagram of an example implementation of the communication system analyzer of FIG.1 .
  • FIG. 3 is a flowchart representative of machine readable instructions that may be carried out to implement the combination of the mobile device and the communication logger of FIG. 1 .
  • FIG. 4 is a flowchart representative of machine readable instructions that may be carried out to implement the communication system analyzer of FIG. 1 .
  • FIG. 5 illustrates example machine readable instructions that may be carried out to identity adjacent sectors.
  • FIG. 6 is a flowchart representative of machine readable instructions that may be carried out to determine when an identifier has been used.
  • FIG. 7 is a state diagram illustrating an example state flow for communication between the mobile device and the base stations of FIG. 1 .
  • FIG. 8 is a flowchart representative of machine readable instructions that may be carried out to determine identifier reuse.
  • FIG. 9 is another flowchart representative of machine readable instructions that may be carried out to determine identifier reuse.
  • FIG. 10 is another flowchart representative of machine readable instructions that may be carried out to determine identifier reuse is illustrated.
  • FIG. 11 is another flowchart representative of machine readable instructions that may be carried out to determine identifier reuse.
  • FIG. 12 is an illustration of an example database for storing message and analysis information for the communication logger and/or the communication system analyzer of FIG. 1 .
  • FIG. 13 is an illustration of how identifier information is grouped to determine the number of base stations.
  • FIG. 14 is a block diagram of an example computer platform capable of executing the machine readable instructions illustrated in FIGS. 3-6 and 8-11 to implement the methods and/or apparatus disclosed herein.
  • FIG. 1 is a block diagram of an example system 100 in which a monitoring system 106 is used to analyze communication system transceivers.
  • the example monitoring system 106 may be used, for example, to determine the number of base stations in a particular communication system and/or a portion thereof. For example, all or part of the monitoring system 106 may be moved throughout a geographical area in which the communication system is located (e.g., all or part of the monitoring system 106 may be driven throughout a city in a vehicle). As the monitoring system 106 is moved throughout the city, messages received from base stations of the communication system are stored. Once a sufficient or desired number of messages has been stored, the messages are analyzed to determine how many base stations transmitted messages to the monitoring system 106. The results of the analysis are stored and/or reported by the example monitoring system 106.
  • the example system 100 includes a base station 102, a base station 104, and the monitoring system 106.
  • the example base station 102 and the example base station 104 are mobile telephone transceiver base stations that send messages to and receive messages from mobile telephones (e.g., mobile device 108) according to the code division multiple access (CDMA) communication standard.
  • the example base stations 102 and 104 include three sectors illustrated by the divided circle above each of the base stations 102 and 104. Each sector includes communication circuitry (e.g., one or more antennas) to communicate with devices in a region extending radially from the base stations 102 and 104. The regions covered by each sector may be exclusive and/or may overlap. While the example base stations 102 and 104 include three sectors, any number of sectors may be included (i.e., one or more sectors) at each of the base stations 102 and 104.
  • the base stations 102 and 104 may be any type of base station for communicating with wireless devices and systems such as, for example, for communicating with a pager communication system, a wireless networking communication system, a citizen's band (CB) radio communication system, a broadcast radio system, a broadcast television system, etc.
  • the base stations 102 and 104 may communicate with any type of mobile telephone system (e.g., a time division multiple access (TDMA) system, a global system for mobile communication (GSM) system, etc.).
  • TDMA time division multiple access
  • GSM global system for mobile communication
  • L3 messages provide information about the mobile communication system to the mobile device 108.
  • the type of information included in an L3 message depends on the state of communication between the base stations 102 and 104 and the mobile device 108.
  • the example monitoring system 106 classifies communications in three states: idle, traffic, and init. The states and the transitions between states are described in further detail in conjunction with the state diagram of FIG. 8 .
  • L3 messages are parameter messages (System Parameter Messages (SPM)) that include the following parameters:
  • L3 messages are strength messages (Pilot Strength Measurement Messages (PSMM) and Periodic Pilot Strength Measurement Messages (PPSMM)) and handoff messages (Handoff Direction Messages (HDM)).
  • PSMM Peak Strength Measurement Messages
  • PPSMM Periodic Pilot Strength Measurement Messages
  • HDM Handoff Direction Messages
  • Handoff messages include the following parameters:
  • the example system 100 may alternatively be implemented using any type of messages for any communication standard.
  • the system 100 may be implemented by a system that transmits and/or receives any type of messages that include a semi-unique (e.g., unique for a particular subset of a network, but not necessarily unique throughout the entire communication system) identifier for a base station and/or sector of a base station.
  • a semi-unique e.g., unique for a particular subset of a network, but not necessarily unique throughout the entire communication system
  • the monitoring system 106 of the illustrated example communicates with the base stations 102 and 104 and monitors such communications to analyze the transceivers of the communication system 100.
  • the example monitoring system 106 includes the mobile device 108, a communication logger 110, a communication system analyzer 112, and a datastore 114.
  • the mobile device 108 of the illustrated example is a mobile telephone that communicates with the base stations 102 and 104.
  • the example mobile device 108 is a mobile phone that has not been substantially modified (outside of normal user operation) other than having the communication logger 110 attached to an available port of the mobile device 108. Because the mobile device 108 of the illustrated example can be utilized without substantial modification, many different types of mobile devices can be easily used. However, in some implementations modification of the mobile device 108 may be desired and/or required.
  • the communication logger 110 receives and stores some or all of the communications (e.g., L3 messages) in the datastore 114.
  • the mobile device 108 may be used in any desired manner during such an operation.
  • the mobile device 108 may be powered-on but idle, may be receiving a communication (e.g., a telephone call, a text message, an email message, etc.) from the base stations 102 and/or 104, may be placing or in the midst of a telephone call, etc.
  • the mobile device 108 is transported throughout a geographic area and, thus, enters and leaves the various signal areas of the sectors of the base stations 102 and 104.
  • the mobile device 108 may be placed in a vehicle that follows a pre-mapped route that is designed to maximize exposure to a communication system or coverage of a geographical area.
  • the communication logger 110 is connected to the mobile device 108 while the mobile device 108 is transported.
  • the mobile device 108 may include storage and be configured with the capability to store communication messages.
  • the communication logger 110 is connected to a later time to retrieve (i.e., download) the stored communication messages.
  • the example communication logger 110 is a system that retrieves, captures, and/or monitors communication messages at the mobile device 108 and stores the communication messages in the datastore 114.
  • An example communication logger 110 is the Invex3G® wireless network drive test system from Andrew® Wireless Solutions.
  • any device, software, or system that is capable of retrieving, capturing, and/or monitoring communications at the mobile device 108 may be used.
  • the communication logger 110 may be software, devices, or systems that are integrated in the mobile device 108.
  • the mobile device 108 may be integrated with the communication logger 110 (i.e., the monitoring system 106 may not include a mobile device 108 separate from the communication logger 110).
  • the example monitoring system 106 includes a single mobile device 108 and a single communication logger 110, other implementations may include any number of each.
  • an example monitoring system 106 may include multiple mobile devices 108 and a single communication logger 110.
  • the example datastore 114 may be any type of memory that is capable of storing messages and any other logging data from the mobile device 108 and/or the communication logger 110.
  • the datastore 114 may be a database, a flash memory, a hard disk drive, a floppy disk drive, a compact disc drive, a digital versatile disc drive, etc.
  • the example datastore 114 may be integrated with and/or communicably attachable to the mobile device 108, the communication logger 110, and/or the communication system analyzer 112.
  • the example datastore 114 may provide for retrieval of data by the communication system analyzer 112 and/or may transmit to the communication system analyzer 112.
  • the communication system analyzer 112 of the illustrated example receives and/or retrieves communication messages from the datastore 114 (e.g., directly and/or via the communication logger 110) and analyzes the communication messages to determine information about the base stations 102 and 104 (e.g., to determine the number of base stations and sectors thereof).
  • the communication system analyzer 112 stores the determined information and/or reports the determined information.
  • An example implementation of the communication system analyzer 112 is described in conjunction with FIGS. 2 and 4-12 .
  • the example monitoring system 106 may be used, for example, by a consumer research company or communication system provider to analyze the density of base stations and reach such base stations in a communication system provided by a communication system provider.
  • the consumer reporting company or agency may analyze the communication systems of two competing mobile telephone service providers to determine which service has more base stations in a particular area.
  • FIG. 2 is a block diagram of an example implementation of the communication system analyzer 112 of FIG.1 .
  • the example communication system analyzer 112 includes a retriever 204, a datastore 206, an extractor 208, an analyzer 210, a datastore 212, and a reporter 214.
  • the retriever 204 of the illustrated example retrieves messages stored in the datastore 114 by the communication logger 110 of FIG. 1 .
  • the example retriever 204 stores the messages in the datastore 206.
  • the retriever 204 may transmit the messages to the extractor 208 for analysis.
  • the retriever 204 retrieves all of the messages stored in the datastore 114.
  • the retriever 204 may retrieve messages for analysis as they are stored.
  • the example datastore 206 may be any type of memory that is capable of storing messages and any other logging data from the retriever 204.
  • the datastore 206 may be a database, a flash memory, a hard disk drive, a floppy disk drive, a compact disc drive, a digital versatile disc drive, etc.
  • the example datastore 206 may be integrated with and/or communicably attachable to the retriever 204 and/or the extractor 208.
  • the example communication system analyzer 112 includes the datastore 206 and the datastore 212, the datastores 206 and 212 may alternatively be implemented as a single datastore. Additionally or alternatively, one or both of the datastores 206 and 212 may be implemented by the datastore 114 of FIG. 1 .
  • the extractor 208 of the illustrated example retrieves messages from the datastore 206 and/or receives messages from the retriever 204 and extracts parameter values from the messages.
  • the example extractor 208 transmits the parameters to the analyzer 210.
  • the extractor 208 of the illustrated example extracts PN offsets (e.g., PILOT_PN) from messages for analysis.
  • the messages may be plain text messages from which the parameters can be read.
  • the messages may be encrypted and/or encoded and, thus, the extractor 208 decrypts and/or decodes the messages appropriately to extract the parameters.
  • the example analyzer 210 analyzes parameters received from the extractor 208 to determine desired information about the communication system (e.g., the number of base stations 102 and 104).
  • the analyzer 210 of the illustrated example receives PN offsets and groups the PN offsets by base station to determine the number of base stations.
  • the example analyzer 210 stores the results of the analysis in the datastore 212 and/or transmits the results to the reporter 214.
  • An example method for implementing the analyzer 210 is described in conjunction with FIGS. 4-12 .
  • the example datastore 212 may be any type of memory that is capable of storing information and results from the analyzer 210.
  • the datastore 212 may be a database, a flash memory, a hard disk drive, a floppy disk drive, a compact disc drive, a digital versatile disc drive, etc.
  • the example datastore 212 may be integrated with and/or communicably attachable to the analyzer 210 and/or the reporter 214.
  • the reporter 214 of the illustrated example receives results and/or information from the analyzer 210 and/or retrieves the results and/or information from the datastore 212 and generates and/or presents a report of the information.
  • the reporter 214 may provide the information via a computer interface (e.g., a webpage on the internet), via a paper report, etc.
  • the reporter 214 may transmit the report and/or information to any other source such as, for example, a client that commissioned a network analysis, a network provider whose network was analyzed, etc.
  • the example communication system analyzer 212 of FIG. 2 includes the datastore 212 and the reporter 214, the communication system analyzer 212 may alternatively include one of the datastore 212 and the reporter 214 when only one of storing the results and reporting the results is desired.
  • FIGS. 3-6 and 8-11 are flowcharts representative of example machine readable instructions that may be executed to implement the base station 102, the base station 104, the monitoring system 106, the mobile device 108, the communication logger 110, the communication system analyzer 112, and/or the datastore 114 of FIG. 1 and/or the retriever 204, the datastore 206, the extractor 208, the analyzer 210, the datastore 212, and/or the reporter 214 of FIG. 2 .
  • the example machine readable instructions of FIGS. 3-6 and 8-11 may be executed by a processor, a controller, and/or any other suitable processing device. For example, the example machine readable instructions of FIGS.
  • 3-6 and 8-11 may be embodied in coded instructions stored on a tangible medium such as a flash memory, or random access memory (RAM) associated with a processor (e.g., the processor 1412 shown in the example processor platform 1400 and discussed below in conjunction with FIG. 14 ).
  • a processor e.g., the processor 1412 shown in the example processor platform 1400 and discussed below in conjunction with FIG. 14 ).
  • the example flowcharts of FIGS. 3-6 and 8-11 may be implemented using an application specific integrated circuit (ASIC), a programmable logic device (PLD), a field programmable logic device (FPLD), discrete logic, hardware, firmware, etc.
  • ASIC application specific integrated circuit
  • PLD programmable logic device
  • FPLD field programmable logic device
  • the example flowcharts of FIGS. 3-6 and 8-11 may be implemented manually or as combinations of any of the foregoing techniques.
  • any or all of the base station 102, the base station 104, the monitoring system 106, the mobile device 108, the communication logger 110, the communication system analyzer 112, and/or the datastore 114 of FIG. 1 and/or the retriever 204, the datastore 206, the extractor 208, the analyzer 210, the datastore 212, and/or the reporter 214 of FIG. 2 may be implemented by a combination of firmware, software, and/or hardware.
  • the base station 102, the base station 104, the monitoring system 106, the mobile device 108, the communication logger 110, the communication system analyzer 112, and/or the datastore 114 of FIG. 1 and/or the retriever 204, the datastore 206, the extractor 208, the analyzer 210, the datastore 212, and/or the reporter 214 of FIG. 2 is implemented by executing the example machine readable instructions represented by the flowcharts of FIGS. 3-6 and 8-11 , many other methods of implementing instructions represented by FIGS. 3-6 and 8-11 may be employed. For example, the order of execution of the blocks may be changed, and/or some of the blocks described may be changed, eliminated, sub-divided, and/or combined.
  • the example machine readable instructions of FIGS. 3-6 and 8-11 may be carried out sequentially and/or carried out in parallel by, for example, separate processing threads, processors, devices, circuits, etc.
  • at least one of the base station 102, the base station 104, the monitoring system 106, the mobile device 108, the communication logger 110, the communication system analyzer 112, and/or the datastore 114 of FIG. 1 and/or the retriever 204, the datastore 206, the extractor 208, the analyzer 210, the datastore 212, and/or the reporter 214 of FIG. 2 are hereby expressly defined to include a tangible medium such as a memory, DVD, CD, etc.
  • FIG. 3 is a flowchart representative of machine readable instructions that may be carried out to implement the combination of the mobile device 108 and the communication logger 110 of FIG. 1 . While the mobile device 108 and the communication logger 110 are treated as a single apparatus for the purposes of the flowchart of FIG. 3 , the devices may operate independently of each other. For example, the mobile device 108 may receive messages that are retrieved by the communication logger 110 at some time after such receipt.
  • the example machine readable instructions of FIG. 3 begin when the mobile device 108 receives one or more messages from one or more of the base stations 102 and 104 at a first geographical location (block 302).
  • the example communication logger 110 stores the message(s) in the datastore 114 of FIG. 1 (block 304).
  • the communication logger 110 may store any additional information that is available such as, for example, a current location identified by a global positioning system (GPS) device integrated with or attached to the communication logger 110.
  • GPS global positioning system
  • the mobile device 108 and/or the communication logger 110 are then moved to a new location (block 306). While the illustrated example illustrates that machine readable instructions move the mobile device 108 and/or the communication logger 110 to a new location, movement to a new location may be performed by any other process. Moving the mobile device 108 causes the mobile device 108 to move into and out of the communication range of the sectors of the base stations 102 and 104. For example, a person may carry the mobile device 108 around a geographical area, a vehicle may transport the mobile device around a geographical area, etc.
  • control returns to block 302 to receive another message(s) from the base stations 102 and/or 104.
  • FIG. 4 is a flowchart representative of machine readable instructions that may be carried out to implement the communication system analyzer 112 of FIG. 1 .
  • the flowchart of FIG. 4 begins when the retriever 204 of FIG. 2 retrieves one or more messages from the log of messages stored in the datastore 114 of FIG. 1 (block 402). According to the illustrated example, messages are retrieved one at a time as they are processed. Alternatively, all or some sub-set of the messages may be retrieved and then processed. For example, the messages retrieved may be stored in the datastore 206 and then processed.
  • the analyzer 210 determines the type of the message (e.g., a handoff message (e.g., HDM), a strength measurement message (e.g., PSMM or PPSMM), a parameter message (e.g., SPM), or an unknown message) (block 404).
  • the extractor 208 may extract a parameter indicative of the type of the message and the analyzer 210 may analyze the parameter. If the message is an unknown message (block 404), the message is ignored and control returns to block 402 to process the next message.
  • the analyzer 210 identifies adjacent sectors based on the message (block 406).
  • An example process for identifying adjacent sectors (block 406) is described in conjunction with FIG. 5 .
  • the analyzer 210 determines if identifiers (e.g., PN offsets) from two or more messages are associated with sectors of the same one of the base stations 102 or 104 (e.g., the sectors are adjacent to each other at the one of the base stations 102 or 104). Control then proceeds to block 412, which is described below.
  • the analyzer 210 eliminates spurious identifiers (block 408).
  • the analyzer 210 may receive a PN offset and a distance or location of the base station sending the message extracted from the message by the extractor 208. If the distance or location indicates that the base station was further than a threshold distance, the message is ignored.
  • the message may compare the PILOT_PN_PHASE of an L3 message to a fraction (e.g., 80%) of the SRC WIN A and label the message as spurious in the datastore 114 if the PILOT PN PHASE is greater than the fraction of the SRC WIN A. Control then proceeds to block 410, which is described below.
  • the analyzer 210 determines if the identifier is reused (block 410). For example, the analyzer 210 receives the extracted PN offset from the extractor 208 and determines if the PN offset was used for another sector that was monitored (e.g., a PN was used for sector 1 of base station 102 and sector 3 of base station 104). Control then proceeds to block 412, which is described below. An example process for identifying adjacent sectors (block 406) is described in conjunction with FIG. 6 .
  • the analyzer 210 stores the result of the analysis in the datastore 212 (block 412).
  • the analyzer 210 may store a record for the PN offset and label the record as adjacent to a sector and/or a reused PN offset when appropriate.
  • the analyzer 210 may update a record that is already stored in the combined datastore. An example illustration of a database implemented according to such an example is described in conjunction with FIG. 12 .
  • the analyzer 210 and/or the extractor 208 determine if there are additional messages in the log (block 414). If there are additional messages in the log (block 414), control returns to block 402 to process the remaining messages.
  • the analyzer 210 groups the retrieved identifiers by base station based on the results stored to or updated in the datastore 212 in block 412 (block 416). For example, all identifiers determined to be adjacent are grouped and labeled as a single base station and assigned the next consecutive cell identifier. The results are then stored in the datastore 212 and/or reported by the reporter 214 (block 418). An example table for storing the results of grouping is illustrated in FIG. 13 .
  • FIG. 5 illustrates example machine readable instructions that may be carried out to identify adjacent sectors (block 406 of FIG. 4 ).
  • the example flowchart of FIG. 5 begins when the retriever 204 retrieves the message that was prior to the current message (block 502).
  • the message may be the message immediately prior to the current message in the datastore 114 and/or may be the message that is temporally prior to the current message (e.g., when the datastore 114 includes messages associated with more than one communication system).
  • the extractor 208 then extracts a combination parameter from the current message (block 504).
  • the combination parameter may be the PWR COMB IND of a CDMA L3 message.
  • the PWR_COMB_IND parameter is a bit that, when set, indicates whether the forward traffic channel associated with the current message carries the same closed-loop power control subchannel bits as the previous message.
  • the analyzer 210 determines if the combination parameter is set (e.g., indicating that the current message and the previous message were sent by the same base station) (block 506). If the combination parameter is not set (block 506), the machine readable instructions of FIG. 5 are completed and control returns to the machine readable instructions of FIG. 4 .
  • the combination parameter e.g., indicating that the current message and the previous message were sent by the same base station
  • the extractor 208 extracts the identifier (e.g., PN offset) from the current message (block 508).
  • the extractor 208 then extracts the identifier from the previous message (block 510).
  • the analyzer 210 then stores an indication in the database 212 that the identifier from the current message is adjacent to the identifier from the previous message (block 512).
  • the datastore 210 may include (or be updated to include) a record for each of the identifier from the first message and the identifier from the second message.
  • the record for the identifier from the first message may be updated to identify the identifier from the second message as an adjacent identifier (i.e., the sectors associated with the identifiers are adjacent).
  • the record for the identifier from the second message may be updated to identify the identifier from the first message. Accordingly it can be determined that, while two different identifiers were received, only a single base station should be counted.
  • the machine readable instructions of FIG. 5 terminate and control returns to the machine readable instructions of FIG. 4 .
  • FIG. 6 is a flowchart representative of machine readable instructions that may be carried out to determine when an identifier (e.g., a PN offset) has been used (block 410 of FIG. 4 ).
  • the flowchart of FIG. 6 begins when the analyzer 210 determines the state of the previous message (block 602). For example, the analyzer 210 may track the message state (e.g., the communication state classified by the monitoring system 106) based on the state diagram of FIG. 7 . Alternatively, the extractor 208 may retrieve the previous message from the datastore 206 and extract an identifier indicative of the message state. The analyzer 210 then determines the state of the current message (i.e., the state that the mobile device 108 is transitioning into) (block 604). For example, the extractor 208 may extract a message type from the current message and the analyzer 210 may determine the next state based on the previous state and the message type using the state diagram of FIG. 7 .
  • the state diagram of FIG. 7 is described below.
  • the analyzer 210 determines the state combination (e.g., the particular combination of previous state and next state) (block 608). Based on the state combination, a particular operation(s) is performed to determine if the identifier has been reused (i.e., to determine if the identifier has been received from a different base station). While the following describes separate operations for each combination of states, the same operation may be performed for multiple states.
  • operation A an example implementation of which is described in conjunction with FIG. 8
  • operation B an example implementation of which is described in conjunction with FIG. 9
  • operation C an example implementation of which is described in conjunction with FIG. 8
  • control then returns to block 412 of FIG. 4
  • operation D an example implementation of which is described in conjunction with FIG. 8
  • FIG. 7 is a state diagram illustrating an example state flow for communication between the mobile device 108 and the base stations 102 and 104.
  • the example state diagram includes three states: an init state 702, an idle state 704, and a traffic state 706.
  • communication begins in the init state 702. When a parameter message is transmitted, communication transitions to the idle state 704. Alternatively, while in the init state 702, when a strength message or a handoff message is transmitted, communication transitions to the traffic state 706.
  • a parameter message When in the idle state 704, a parameter message does not cause a transition to anther state. According to the illustrated example; a strength message or a handoff message causes a transition from the idle state 704 to the traffic state 706.
  • a strength message or a handoff message does not cause a transition to another state.
  • a parameter message causes a transition from the traffic state 706 to the idle state 704.
  • FIG. 8 a flowchart representative of machine readable instructions that may be carried out to determine identifier reuse is illustrated.
  • the machine readable instructions of FIG. 8 are carried out when one or more messages between the mobile device 108 and one or more of the base stations 102 and 104 cause the mobile device 108 that is in the idle state to remain in the idle state.
  • the flowchart of FIG. 8 begins when the extractor 208 extracts a base station identifier (e.g., BASE_ID) from the current message (i.e., a base station identifier associated with the identifier (e.g., PN offset)) (block 802).
  • a base station identifier e.g., BASE_ID
  • a base station identifier associated with the identifier e.g., PN offset
  • the analyzer 210 then retrieves a set of one or more previously stored base station identifiers (e.g., base station identifiers from messages that have been previously analyzed) from the datastore 212 (block 804).
  • the analyzer 210 compares the extracted base station identifier to the set of one or more previously stored base station identifiers to determine if the extracted base station identifier is listed in the set of one or more previously stored base station identifiers (block 806). If the extracted base station identifier is listed in the set of one or more previously stored base station identifiers (block 806), the machine readable instructions of FIG. 8 terminate and control returns to FIG. 6 .
  • the identifier e.g., PN offset
  • the identifier (e.g., PN offset) is marked as reused by another base station (block 808). For example, a new database table may be created each time that a reused identifier is determined to track the new instance of the identifier.
  • the machine readable instructions of FIG. 8 then terminate and control returns to FIG. 6 .
  • FIG. 9 is a flowchart representative of machine readable instructions that may be carried out to determine identifier reuse.
  • the machine readable instructions of FIG. 9 are carried out when one or more messages between the mobile device 108 and one or more of the base stations 102 and 104 cause the mobile device 108 that is in the idle state to transition to the traffic state.
  • the flowchart of FIG. 9 begins when the extractor 208 determines the location of the mobile device 108 (e.g., the extractor 208 may operate in conjunction with the retriever 204 to retrieve location information from a global positioning system provided by the communication logger 110 and/or may retrieve location information from the datastore 206 stored in association with messages) (block 902).
  • the extractor 208 then extracts location information for one or more base stations associated with the identifier of the current message (e.g., the PN offset) (e.g., the base stations 102 or 104) that transmitted the message (block 904). For example, the extractor 208 may retrieve location information stored in the datastore 206.
  • the PN offset e.g., the base stations 102 or 104
  • the example analyzer 210 determines one or more difference (e.g., a distance) between the location information associated with the mobile device 108 and the one or more the base stations that transmitted messages with the identifier from the current message (block 906). Then, the analyzer 210 determines if any of the one or more differences exceeds a threshold (block 908). In other words, the analyzer 210 determines if any of the base stations that sent messages having the same identifier as the current message are further than a threshold distance from the mobile device. In the illustrated example, the analyzer 210 determines if the distance between the mobile device 108 and the base station is greater than 5 miles.
  • one or more difference e.g., a distance
  • the instructions of FIG. 9 terminate and control returns to FIG. 6 .
  • the identifier has not been reused based on the assumption that the same identifier is not used for overlapping geographical areas (e.g., two base stations within the threshold distance will not be configured by the provider to use the same identifier for any of the sectors of the base stations).
  • the analyzer 210 marks the identifier as reused (block 910). In other words, it is determined that a base station, different from the currently communicating base station, further away than the threshold distance used the same identifier. For example, a new database table may be created each time that a reused identifier is determined to track the new instance of the identifier. The machine readable instructions of FIG. 9 then terminate and control returns to FIG. 6 .
  • FIG. 10 a flowchart representative of machine readable instructions that may be carried out to determine identifier reuse is illustrated.
  • the machine readable instructions of FIG. 10 are carried out when one or more messages between the mobile device 108 and one or more of the base stations 102 and 104 cause the mobile device 108 that is in the traffic state to transition to the idle state.
  • the flowchart of FIG. 10 begins when the extractor 208 extracts a base station identifier (e.g., BASE_ID) from the current message (i.e., a base station identifier associated with the identifier (e.g., PN offset)) (block 1002).
  • a base station identifier e.g., BASE_ID
  • a base station identifier associated with the identifier e.g., PN offset
  • the analyzer 210 then retrieves a set of one or more previously stored base station identifiers (e.g., base station identifiers from messages that have been previously analyzed) from the datastore 212 (block 1004).
  • the analyzer 210 compares the extracted base station identifier to the set of one or more previously stored base station identifiers to determine if the extracted base station identifier is listed in the set of one or more previously stored base station identifiers (block 1006). If the extracted base station identifier is listed in the set of one or more previously stored base station identifiers (block 1006), the machine readable instructions of FIG. 8 terminate and control returns to FIG. 6 .
  • the identifier e.g., PN offset
  • the extractor 208 determines the location of the mobile device 108 (e.g., the extractor 208 may operate in conjunction with the retriever 204 to retrieve location information from a global positioning system provided by communication logger 110 and/or may retrieve location information from the datastore 206 stored in association with messages) (block 1008).
  • the extractor 208 then extracts location information for one or more base stations associated with the identifier of the current message (e.g., the PN offset) (e.g., the base stations 102 or 104) that transmitted the message (block 1010).
  • the extractor 208 may retrieve location information stored in the datastore 206.
  • the example analyzer 210 determines a difference (e.g., a distance) between the location information associated with the mobile device 108 and each of the base stations that transmitted messages with the identifier from the current message (block 1012). Then, the analyzer 210 determines if the difference exceeds a threshold (block 1014). In other words, the analyzer 210 determines if any of the base stations that sent messages having the same identifier as the current message are further than a threshold distance from the mobile device. In the illustrated example, the analyzer 210 determines if the distance between the mobile device 108 and the base station is greater than 5 miles. If the difference does not exceed the threshold (e.g., the base station is within a predetermined distance from the mobile device 108), the instructions of FIG.
  • a difference e.g., a distance
  • the analyzer 210 marks the identifier as reused (block 1016). In other words, it is determined that a base station, different from the currently communicating base station, further away than the threshold distance used the same identifier. For example, a new database table may be created each time that a reused identifier is determined to track the new instance of the identifier. The machine readable instructions of FIG. 10 then terminate and control returns to FIG. 6 .
  • FIG. 11 is a flowchart representative of machine readable instructions that may be carried out to determine identifier reuse.
  • the machine readable instructions of FIG. 11 are carried out when one or more messages between the mobile device 108 and one or more of the base stations 102 and 104 cause the mobile device 108 that is in the traffic state to remain in the traffic state.
  • the flowchart of FIG. 11 begins when the extractor 208 determines the location of the mobile device 108 (e.g., the extractor 208 may operate in conjunction with the retriever 204 to retrieve location information from a global positioning system provided by the communication logger 110 and/or may retrieve location information from the datastore 206 stored in association with messages) (block 1102).
  • the extractor 208 and/or the analyzer 210 determine if location information for base stations associated with the identifier in the current message is stored in the datastore 206 (block 1104).
  • the extractor 208 retrieves the location information (block 1106).
  • the example analyzer 210 determines a difference (e.g., a distance) between the location information associated with the mobile device 108 and each of the base stations that transmitted messages with the identifier from the current message (block 1108). Then, the analyzer 210 determines if the difference exceeds a first threshold (block 1110). In other words, the analyzer 210 determines if any of the base stations that sent messages having the same identifier as the current message are further than a threshold distance from the mobile device.
  • the analyzer 210 determines if the distance between the mobile device 108 and the base station is greater than 5 miles. If the difference does not exceed the threshold (e.g., the base station is within a predetermined distance from the mobile device 108), the instructions of FIG. 11 terminate and control returns to FIG. 6 . In other words, it is determined that the identifier has not been reused based on the assumption that the same identifier is not used for overlapping geographical areas (e.g., two base stations within the threshold distance will not be configured by the provider to use the same identifier for any of the sectors of the base stations).
  • the threshold e.g., the base station is within a predetermined distance from the mobile device 108
  • the analyzer 210 marks the identifier as reused (block 1112). In other words, it is determined that a base station, different from the currently communicating base station, further away than the threshold distance used the same identifier. For example, a new database table may be created each time that a reused identifier is determined to track the new instance of the identifier. The machine readable instructions of FIG. 11 then terminate and control returns to FIG. 6 .
  • the extractor 208 extracts the last seen mobile location parameters (e.g., a parameter identifying the last seen mobile device location transmitted in a strength message) for each of the one or more records having the same identifier as the identifier in the current message from the datastore 206 (block 1114).
  • the example analyzer 210 determines a difference (e.g., a distance) between the location information associated with the mobile device 108 and each of the last seen mobile station locations (block 1116).
  • the analyzer 210 determines if the difference exceeds a second threshold (block 1118). In other words, the analyzer 210 determines if all of the last seen mobile stations are further than a threshold distance from the mobile device 108. In the illustrated example, the analyzer 210 determines if the distance between the mobile device 108 and the base station is greater than 10 miles. If at least one difference does not exceed the second threshold (e.g., the last seen mobile station is within a predetermined distance from the mobile device 108), the instructions of FIG. 11 terminate and control returns to FIG. 6 . In other words, it is determined that the identifier has not been reused.
  • the analyzer 210 marks the identifier as reused (block 1120). For example, a new database table may be created each time that a reused identifier is determined to track the new instance of the identifier.
  • the machine readable instructions of FIG. 11 then terminate and control returns to FIG. 6 .
  • FIG. 12 is an illustration of an example database for storing message and analysis information for the communication logger 110 and/or the communication system analyzer 112.
  • the example database fields are divided into two types of fields: time invariant fields and time variant fields.
  • Time invariant fields store data that does not change over time (e.g., as the mobile device 108 is moved throughout a communication system).
  • Time variant fields store data that changes over time (i.e., the time variant fields store the last observed value for a particular parameter).
  • a PN offset field 1202 stores a PN offset value extracted from a message (i.e., the identifier for the sector that transmitted the message).
  • a first adjacent PN field 1204, a second adjacent PN field 1206, a third adjacent PN field 1208, a fourth adjacent PN field 1210, and a fifth adjacent PN field 1212 store PN offset values that are determined to be adjacent to the PN offset identified in the PN offset field 1202.
  • a BASE ID field 1214 stores a base station identifier for the base station that transmitted the message recorded in the database of FIG. 12 .
  • a SID field 1216 stores a system identifier for the communication system associated with the message.
  • a NID field 1218 stores a network identifier for the network of the communication system associated with the message.
  • a BS_LAT field 1220 stores a latitude value for identifying the location of the base station that transmitted the message.
  • a BS_LONG field 1222 stores a longitude value for identifying the location of the base station that transmitted the message.
  • a PN count field 1224 stores an incrementing value representing the number of times that the PN offset identified in the PN offset field 1202 was analyzed.
  • An Ec/lo field 1226 stores the last seen pilot chip energy to power spectral density ratio.
  • a PN phase field 1228 stores the last PN phase.
  • a Spurious count field 1230 stores an incrementing value representing the number of times that the PN offset was recognized as a spurious PN.
  • a SRC WIN A field 1232 stores the last search window size.
  • a PWR COMB IND 1234 stores the value of the last power combination indicator.
  • a Call State field 1236 stores the last call processing state (e.g., init, idle, traffic).
  • An MS_LAT field 1238 stores a mobile station latitude for the location of the last seen mobile station.
  • MS_LONG field 1240 stores a mobile station longitude for the location of the last seen mobile station.
  • the database illustrated in FIG. 12 includes ten tables (i.e., first table 1242, second table 1244, tables 3-9 (not illustrated), tenth table 1246) for storing multiple instances of a PN offset.
  • the first table 1242 stores data associated with the first instance of a PN offset.
  • the second table 1244 stores data associated with a second instance of the PN offset (e.g., for a PN offset that is reused and recognized at a second location in the communication system).
  • the second table 1244 stores data associated with the first reuse.
  • the tenth table 1246 stores data associated with a tenth instance of a PN offset (i.e., a ninth reuse).
  • any number of tables may be used.
  • the database may be designed to use as many tables as needed to provide a separate table for each instance of an identifier.
  • the database may use a single table with multiple entries for each PN offset (e.g., may include a field including an instance identifier).
  • FIG. 13 is an illustration of how identifier information is grouped to determine the number of base stations (e.g., cells).
  • the example of FIG. 13 includes table 1302 and table 1304.
  • table 1302 is a temporary table stored in memory (e.g., random access memory 1418 of FIG. 14 ) and is used to generate the table 1304 that is stored in the datastore 206 and/or the datastore 212 of FIG. 2 .
  • the table 1302 and/or the table 1304 may be stored in any combination of memory, datastore 206, datastore 212, and/or any other database or data storage.
  • the table 1302 includes the PN offset field 1202, the first adjacent PN field 1204, the second adjacent PN field 1206, the third adjacent PN field 1208, the fourth adjacent PN field 1210, the fifth adjacent PN field 1212, and the PN count field 1224.
  • table 1302 illustrates a subset of the data in the database of FIG. 12 .
  • the data in table 1302 is used by the analyzer 210 of FIG. 2 to generate table 1304 (e.g., in blocks 416 and 418 of FIG. 4 ).
  • Table 1302 includes a cell identifier field 1306, a sector 1 PN field 1308, a sector 2 PN field 1310, a sector 3 PN field 1312, a sector 4 PN field 1314, a sector 5 PN field 1316, and a sector 6 PN field 1318.
  • the analyzer 210 locates the first PN offset where the PN counter field 1224 identifies a value greater than zero (e.g., PN offset 0 in the illustrated example).
  • the analyzer 210 inserts the PN offset into the sector 1 PN field 1308 of the first available cell (e.g., cell 1 in the illustrated example). The analyzer 210 then inserts any values from the adjacent fields (1204-1212) in the remaining sector fields (1310-1318). The analyzer 210 then moves to the next PN offset that has a PN count field 1224 greater than zero. Each PN offset should only be added to one of the sector fields (1308-1318) one time. Therefore, if PN offset 0 is adjacent to PN offset 144 (as illustrated), the analyzer 210 should not add PN offset 144 to a new cell in addition to cell 1, that was started for PN offset 0. Accordingly, the number of cells indicates the determination of the number of base stations that were encountered.
  • example table 1304 includes fields for up to six sectors, any number of fields may be provided.
  • the database may be designed to include the same number of fields as the number of sectors at the base station with the greatest number of sectors.
  • FIG. 14 is a block diagram of an example computer platform 1400 capable of executing the machine readable instructions illustrated in FIGS. 3-6 and 8-11 to implement the base station 102, the base station 104, the monitoring system 106, the mobile device 108, the communication logger 110, the communication system analyzer 112, and/or the datastore 114 of FIG. 1 and/or the retriever 204, the datastore 206, the extractor 208, the analyzer 210, the datastore 212, and/or the reporter 214 of FIG. 2 , and/or the other apparatus and/or methods disclosed herein.
  • the computer platform 1400 of the instant example includes a processor 1412 such as a general purpose programmable processor.
  • the processor 1412 includes a local memory 1414, and executes coded instructions 1416 present in random access memory 1418, coded instruction 1417 present in the read only memory 1420, and/or instructions present in another memory device.
  • the processor 1412 may execute, among other things, the machine readable instructions represented in FIGS. 3-6 and 8-11 .
  • the processor 1412 may be any type of processing unit, such as a microprocessor from the Intel ® Centrino ® family of microprocessors, the Intel ® Pentium ® family of microprocessors, the Intel ® Itanium ® family of microprocessors, and/or the Intel XScale ® family of processors. Of course, other processors from other families are also appropriate.
  • the processor 1412 is in communication with a main memory including a volatile random access memory 1418 and a non-volatile read only memory 1420 via a bus 1422.
  • the random access memory 1418 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device.
  • the read only memory 1420 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 1418, 1420 is typically controlled by a memory controller (not shown) in a conventional manner.
  • the computer 1400 also includes a conventional interface circuit 1424.
  • the interface circuit 1424 may be implemented by any type of well known interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a third generation input/output (3GIO) interface.
  • One or more input devices 1426 are connected to the interface circuit 1424.
  • the input device(s) 1426 permit a user to enter data and commands into the processor 1412.
  • the input device(s) can be implemented by, for example, a keyboard, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system.
  • One or more output devices 1428 are also connected to the interface circuit 1424.
  • the output devices 1428 can be implemented, for example, by display devices (e.g., a liquid crystal display, a cathode ray tube display (CRT), a printer and/or speakers).
  • the interface circuit 1424 thus, typically includes a graphics driver card.
  • the interface circuit 1424 also includes a communication device such as a modem or network interface card to facilitate exchange of data with external computers via a network (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
  • a network e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.
  • the computer 1400 also includes one or more mass storage devices 1430 for storing software and data.
  • mass storage devices 1430 include floppy disk drives, hard drive disks, compact disk drives and digital versatile disk (DVD) drives.
  • the example methods and apparatus to analyze communication system transceivers are capable of performing monitoring during any communication state (e.g., init, idle, traffic). Accordingly, the example methods and apparatus can be used to determine the number of base stations, for example, during the traffic state when base station identifiers are not transmitted by base stations. Therefore, the example methods and apparatus allow can be used with a monitoring system that is performing other communication system analysis (e.g., call quality analysis that is performed in the traffic state). However, in other implementations of the disclosed methods and apparatus, communication system transceiver monitoring may only be performed in the init and idle state.
  • any communication state e.g., init, idle, traffic. Accordingly, the example methods and apparatus can be used to determine the number of base stations, for example, during the traffic state when base station identifiers are not transmitted by base stations. Therefore, the example methods and apparatus allow can be used with a monitoring system that is performing other communication system analysis (e.g., call quality analysis that is performed in the traffic state). However, in other implementations of the disclosed

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
EP09007946.8A 2008-06-17 2009-06-17 Verfahren und Vorrichtung zur Analyse von Kommunikationssystem-Sende-Empfangsgeräten Withdrawn EP2136583A3 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/140,896 US8447293B2 (en) 2008-06-17 2008-06-17 Methods and apparatus to analyze communication system transceivers

Publications (2)

Publication Number Publication Date
EP2136583A2 true EP2136583A2 (de) 2009-12-23
EP2136583A3 EP2136583A3 (de) 2013-07-03

Family

ID=41112564

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09007946.8A Withdrawn EP2136583A3 (de) 2008-06-17 2009-06-17 Verfahren und Vorrichtung zur Analyse von Kommunikationssystem-Sende-Empfangsgeräten

Country Status (3)

Country Link
US (1) US8447293B2 (de)
EP (1) EP2136583A3 (de)
BR (1) BRPI0903328A2 (de)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9331892B2 (en) 2009-03-09 2016-05-03 The Nielsen Company (Us), Llc System and method for automatic sub-panel creation and management
US8805407B2 (en) 2012-08-31 2014-08-12 The Nielsen Company (Us), Llc. Methods and apparatus to scan a wireless communication spectrum
US8886161B2 (en) 2012-10-05 2014-11-11 The Nielsen Company (Us), Llc Methods and apparatus to discover spectrum usage of mobile carriers
US9992729B2 (en) 2012-10-22 2018-06-05 The Nielsen Company (Us), Llc Systems and methods for wirelessly modifying detection characteristics of portable devices
US9100926B2 (en) 2013-08-01 2015-08-04 The Nielsen Company (Us), Llc Methods and apparatus to determine a base station location
US9319872B1 (en) * 2014-05-13 2016-04-19 Sprint Spectrum L.P. Method for allocating coverage area identifiers among nearby base stations
US9571979B2 (en) 2015-06-10 2017-02-14 The Nielsen Company (Us), Llc Methods and apparatus for cell tower location estimation using multiple types of data sources

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09312870A (ja) * 1996-05-22 1997-12-02 N T T Ido Tsushinmo Kk Cdma移動通信システムおよびcdma移動通信システムにおけるソフトハンドオーバ制御方法
WO1998053621A2 (en) * 1997-05-19 1998-11-26 Qualcomm Incorporated Method and apparatus for optimization of a cellular network
EP0895435A1 (de) * 1997-07-29 1999-02-03 Hewlett-Packard Company Analyse von Nachbarzellen in zellularem Telekommunikationssystem
EP1011283A2 (de) * 1998-12-17 2000-06-21 Nortel Networks Corporation Verfahren zur Topologie-Analyse in der Verifikation von Nachbar- und Ziellisten in einem CDMA Netzwerk
WO2002005577A2 (en) * 2000-07-10 2002-01-17 Motorola, Inc. Method of forwarding channel assignments for one or more traffic channels
US20040202131A1 (en) * 2003-04-11 2004-10-14 Lg Electronics Inc. Apparatus and method for determining soft or softer handoff in mobile communication system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6101175A (en) * 1997-10-31 2000-08-08 Motorola, Inc. Method and apparatus for handoff within a communication system
US6717547B2 (en) 2001-06-21 2004-04-06 Rosum Corporation Position location using broadcast television signals and mobile telephone signals
US7010321B2 (en) * 2002-02-04 2006-03-07 Qualcomm Inc. Power control avoiding outer loop wind-up
JP4025979B2 (ja) * 2002-04-24 2007-12-26 日本電気株式会社 Cdma移動通信方式における送信電力制御方法および無線基地局とcdma通信システム
US20030235180A1 (en) * 2002-04-26 2003-12-25 Valentin Oprescu-Surcobe Method and apparatus for efficient channel assignment
US7194281B2 (en) * 2002-11-04 2007-03-20 Zte Corporation Method and apparatus for synchronization control of forward link transmitting power during soft handoff in wireless communication systems
US7043214B2 (en) 2002-12-11 2006-05-09 Microsoft Corporation Tower discovery and failover
KR100547804B1 (ko) * 2003-08-18 2006-01-31 삼성전자주식회사 시스템간 핸드오버를 위한 이동국의 셀 탐색 방법 및 시스템
US20050287954A1 (en) 2004-06-28 2005-12-29 Lim Chee B System and method for monitoring a communications network
US7433693B2 (en) 2004-10-27 2008-10-07 Qualcomm Incorporated Location-sensitive calibration data
US7764959B2 (en) 2006-04-13 2010-07-27 Carrier Iq, Inc. Analysis of arbitrary wireless network data using matched filters
US7885239B1 (en) * 2007-06-12 2011-02-08 Sprint Spectrum L.P. Multi-sector rate control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09312870A (ja) * 1996-05-22 1997-12-02 N T T Ido Tsushinmo Kk Cdma移動通信システムおよびcdma移動通信システムにおけるソフトハンドオーバ制御方法
WO1998053621A2 (en) * 1997-05-19 1998-11-26 Qualcomm Incorporated Method and apparatus for optimization of a cellular network
EP0895435A1 (de) * 1997-07-29 1999-02-03 Hewlett-Packard Company Analyse von Nachbarzellen in zellularem Telekommunikationssystem
EP1011283A2 (de) * 1998-12-17 2000-06-21 Nortel Networks Corporation Verfahren zur Topologie-Analyse in der Verifikation von Nachbar- und Ziellisten in einem CDMA Netzwerk
WO2002005577A2 (en) * 2000-07-10 2002-01-17 Motorola, Inc. Method of forwarding channel assignments for one or more traffic channels
US20040202131A1 (en) * 2003-04-11 2004-10-14 Lg Electronics Inc. Apparatus and method for determining soft or softer handoff in mobile communication system

Also Published As

Publication number Publication date
US8447293B2 (en) 2013-05-21
EP2136583A3 (de) 2013-07-03
US20090311966A1 (en) 2009-12-17
BRPI0903328A2 (pt) 2010-06-15

Similar Documents

Publication Publication Date Title
US8447293B2 (en) Methods and apparatus to analyze communication system transceivers
TWI637606B (zh) 藉由用戶設備(ue)閒置模式測量之無線蜂巢式網路的改良的覆蓋估計
RU2009136418A (ru) Конфигурирование повторителя
US20120311147A1 (en) Method and Apparatus for Reporting of Measurement Data
CN102845093A (zh) 执行测量的方法和设备
US9668145B2 (en) Methods and apparatus to scan a wireless communication spectrum
CN102860063A (zh) 执行测量的方法和设备
CN102860062A (zh) 执行测量的方法和设备
US10015677B2 (en) Coverage estimation of wireless cellular networks by user equipment (UE) idle mode measurements
US10390180B1 (en) Geolocation determination with power fingerprinting
US20140315507A1 (en) Apparatus and Method for Detecting Co-Channels Signals
EP3389221B1 (de) Netzwerktabellenfehlererkennung unter verwendung von anrufverfolgungsaufzeichnungen
EP1329026A2 (de) System zur testanalysierung eines funknetzwerks
EP3500871A1 (de) Verfahren und vorrichtung zur positionierung einer drahtloskommunikationsvorrichtung unter verwendung von timing-advance-multilateration
US7301920B2 (en) System and method for identifying co-channel interference in a radio network
US9967712B2 (en) Methods and apparatus for cell tower location estimation using multiple types of data sources
CN111654881B (zh) 信息上报方法、装置及设备
CN113645625B (zh) 伪基站定位方法、装置、电子设备和可读介质
CN109348490B (zh) 一种识别干扰铁路lte网络的邻接载波的方法及装置
CN114040426B (zh) 网络优化方法、异常小区推送方法、装置、终端及服务器
EP3167651B1 (de) Verfahren, drahtloskommunikationsvorrichtung und computerprogramm zur instandhaltung eines satzes von überwachten trägern
JP2018085744A (ja) ユーザ機器(ue)、プログラム、方法、およびコンピュータ可読記録媒体
Chu et al. Random Forest Assisted RF Fingerprinting Positioning for Cellular Network
KR20120136128A (ko) 무선 환경 모니터링 시스템, 단말 장치 및 상기 단말 장치의 무선 환경 모니터링 방법
TW201236493A (en) Method of recording and measuring data for use in CPE of mobile communication system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA RS

RIC1 Information provided on ipc code assigned before grant

Ipc: H04W 24/08 20090101AFI20130524BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20140104